Department of Information Technology, P.R.M.I.T& R Badnera, India

Size: px
Start display at page:

Download "Department of Information Technology, P.R.M.I.T& R Badnera, India"

Transcription

1 Volume 5, Issue 4, April 2015 ISSN: X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Special Issue on Impact of Technology on Skill Development Conference Held at IETE Amravati Center, Maharashtra, India The Effectiveness of Request Redirection for Web Services 1 Prof. Preeti V. Dudhe, 2 Rachana N. Sawade 1 Assistant Professor 2 Student Master of Engineering, 1, 2, Department of Information Technology, P.R.M.I.T& R Badnera, India Abstract It is becoming increasingly common to construct network services using redundant resources geographically distributed across the Internet. Networks are a prime example. Such systems sends client requests to an appropriate server based on a variety of factors-- e.g., server load, network proximity, cache locality--in an effort to reduce response time and increase the system capacity under load. This paper introduce a heavily loaded application can sometimes crash due to transactional overload. An application can be deployed on multiple servers. This application implements a redirection server which analyzes the workload on each server and maintains a load database. Depending on the workload on the servers the new work will be allocated and excess load is avoided for smooth performance, hence the concept of request redirection is required. To explain the concept of redirection we have choose the example of ATM banking. Here a thin client is making a request which is pass on to the visa server which in turn analyze the request and then redirects it to the particular bank server. The bank server then handle the request and return the processed information back to visa server, which finally sends it to user. Index Terms Redirection, Server load, Network proximity, Cache locality. I.INTRODUCTION The explosive growth of traffic on the World Wide Web is causing a rapid increase in the request rate to popular Websites. This site can suffer from severe congestion, especially in conjunction with special events; the administrators of popular sites constantly face the need of improving the capacity of their Web-servers to meet the demands of the users. One approach to handle popular Web sites is based on the replication of information across a mirrored-server architecture, which provides a list of independent URL sites that have to be manually selected by the users. A more promising solution is to rely on a distributed architecture that can route incoming requests among several server nodes in a user-transparent way. This approach can potentially improve throughput performance and provide Web-server systems with high scalability and availability. However, a number of challenges must be addressed to make a distributed server cluster function efficiency as a single server within the framework of the HTTP protocol and Web browsers. In this paper we describe and discuss the various approaches on routing requests among the Web-server nodes. We analyze the efficiency and the limitations of the different techniques and the tradeoff among the alternatives. The scope of this paper is not to describe the detailed technical features of each approach, for which we refer the reader to the appropriate literature. Its aim is rather to analyze the characteristics of each approach and its effectiveness on Web-server scalability[1]. In today s world, more or less, every activity belongs to internet. The increase of E-Commerce has leads many businesses to carry out the most of their day-to-day business online transaction on data. As a result of the popularity of the web, providers of web sites and storage space providers want to ensure the availability of access to information for their users and the guarantee that requests are processed as quickly as possible [2]. Every human activity, business activity etc is completely or partially dependent on the computer and on computer network. The most common one we perform is of banking transaction. No one likes to stand in a queue for withdrawing their money. So the concept of ATM was introduced. It eased the work to some extent. But this ease was short lived as the number of ATM users grew exponentially every year. With this their arouse the need to open more and more ATM hereby increasing burden on banks. Then came on to develop such a centralized system which can connect various banks throughout the world, thereby reducing burden on the banks. With this new functioning arouse the need of redirection. The ATM all over the world are now connected to some central servers that redirects the request to particular bank servers and then act as connection link between the banks and clients.this has led to big technological boom in banking sector. 2015, IJARCSSE All Rights Reserved Page 234

2 II. LITERATURE REVIEW responsibility of Netscape browser to randomly chose one of these when user accessed This approach is not useful because it is not scalable. The key concept of this paper is basically request redirection. If redirection is considered in abstract sense then it is basically diverting the request to some other location. There are various form of redirection implemented on internet. The various forms of redirection are implemented for various types of applications and various types of needs. It is very powerful tool which is mostly needed to meet the various application requirements, like to maintain load to handle different request types, to optimize resource utilization etc. We are also required to know of the various technology used to implement the redirection concept. The various theoretical back ground required to know before concentrating on the paper development are described as below. A. Definition of Redirection Redirection is basically the process of diverting the request to a particular location and identifying the request. The server identifies the request type based on the defined parameters and the request to the appropriate server and vice versa. The parameters for identifying the request can be IP address, request type, some id etc. Clustered server organization is preferable to multiple independent mirrored-servers because it maintains a single interface to the users and has the potential to be more scalable, fault-tolerant and better load balanced. Requestredirection occurs over distributed sets of servers, minimizing redirection cost. B. Need of Redirection Today we perform various human activities; There are various reasons to do redirection. On the computer network redirection mechanism is very common and is applied in a number of situations: When a single server passes the request to many other servers. Redirection is primarily needed for the load balancing. For popular websites, it is not possible for a single machine to serve all the requests. So several servers are in operation simultaneously, sharing the load. Redirection is also needed when the website has been shifted. Similar domain names, moving a site to a new domain, Logging outgoing links short, meaningful, persistent aliases for long or changing URL s. C. Method of Redirection Once a server is chosen, this involves how to do the redirection. Redirection can be done at various levels: 1.Application level, using HTTP redirect 2. IP level 3. Using DNS [3] DNS- based approaches There is a single name used for the website. The client will ask DNS server for the IP address of the server. At that time, DNS server can choose an appropriate mirror and return its IP address. All mirrors have different IP addresses. Disadvantages: The major problem with this approach is caching. The DNS responses are coached by intermediate DNS servers and by the client also. So for the time a response is cached, all the requests using that will go to the same mirror. As a result, that mirror may get overloaded. So this allows only a coarse grained redirection. The authority name server has only a limited control over caching. Another obvious disadvantage is that it increases the load on DNS server. Dispatcher-based approaches In this approach, there is a central server called dispatcher which receives all the requests and then redirects the requests to appropriate server replicas. The dispatcher has a single IP address and identifies individual servers through some other address. In this approach also, there can be redirection at different levels. The possibilities depend on whether all replicas are on a LAN or are spread on a WAN. Server-based approaches In this approach, one of the mirrors, on getting an HTTP request, may decide to redirect the client to another mirror. Again, the redirection may happen at different levels: IP level with packet rewriting or at HTTP level. But it is generally done at the HTTP level. This approach is used along with another approach like DNS-based redirection. DNS-based redirection provides coarse grained redirection and this approach provides the fine-grained redirection if required. [4][5] III. SYSTEM ANALYSIS & DESIGN The system is divided into three modules, these modules are: Thin client Central server Bank server Client Side approaches In this approach, it is the responsibility of client (typically a browser) to choose a server out of the available mirrors. Earlier, Netscape had several server names www1, www2, www3.. And it was Fig1: Working Model of System Design 2015, IJARCSSE All Rights Reserved Page 235

3 A. Thin client Server side It is nothing but the ATM machines or user interfaces, Client side it is called as thin client because, it has no database or lot of request handling programs. It only consists of some user interfaces so that the user can interact and then transforms the requests into packets to transmit it to the central server ATM Working ATM cards use processors to connect to their various ATM networks. when someone swipes Or insert a debit card or credit card it asks for a pin number. So ATM machine at that time will dial a toll free number to begin the authorization process. ATM will be re-programmed with the TID(terminal ID number) that will identify it on our processor so the network will allow the transaction to complete.this TID along with other identifying information lets the cardholder bank know that the transaction is taking place on your ATM. If there are sufficient funds in the ATM cardholders account for the withdrawal request, the transaction will be completed. The ATM receives the authorization and dispenses the cash requested. Design of Thin Client Like if we consider that whenever we have to use ATM we have to first insert Acc no. and PIN. This is a general format diagram where we will pass on the information and then will click the button to login. On a general basis these two parts can be performing the following functions, the client side will accept the request from the clients change it into some form and add some information to it and then pass it over to other side which will analyses the information and then pass it over respective bank servers and finally will take response from bank servers and give it to client side to hand it over to the clients. Client Manager This part of the central server has the basic job of accepting the packets from client side, add some more information to it, generate a thread and then pass it onto the server manager. Now let us look into details of its function: The client manger is basically responsible for connection to the client/atm. Creating a socket for connection. Receiving and sending data from the socket for that particular connection. Identifying the particular bank. Ask the server manager to create a dedicated connection with the bank. Sending and receiving of data. Working Of the Client Manager B. Visa Server Fig3: Working Model of client manager Fig2: Working Model of Visa Server The central server plays the main role. This central server has to perform the job of connecting link between client and various bank servers. This server has to basically receive the request from client and send it back to bank server and then take request from bank server and send it to clients. Thus we think that central server performs the main job of redirection, so it can be broadly classified as: The main work of the client manager is to handle client side of working, for this it will require to sense a client and establish the connection. So for this particular purpose,the client server will be continuously listens the connections for the presence of the client, now if a client is found then it will establish a socket so that it can receive information in the form of packets. Now the next task is to identify the bank for the packet which has come. this is problem, as there are many ATMs and many banks, how will it recognize that the particular is for which bank. Now the standard 2015, IJARCSSE All Rights Reserved Page 236

4 solution to this problem which modern ATMs follow is that every card has particular id and few digits. So the client manager identifies the bank id. Now it will ask server manager to establish connection with respective banks server,and further packets are received and taken. Server Manager This server manager basically establishes the connection with bank server and send the packet of information. The basic requirements of the server manager are as follows: Maintain the bank server information Establish the connection with the bank server Maintain connection status information Generate commands from the received packets Working of Server Manager The server manager as the name suggest is mainly responsible for maintaining the server side connections and information. Now whenever the client manager asks the server manager to establish a dedicated connection with the respective bank it first has to check number of things. So in order to establish the connection we require the IP address and port numbers, so we can store the IP address of bank we can easily establish a connection. For this purpose a database is maintained by the server manager, which mainly consists of information like banks name, its IP address,its port number, connection is established or not etc. Now when the central server is started this server manager looks into its data base to find which all banks it can connect and then try establishing connection with each on of them. Then create and maintain server connection status information. C. Bank Server Bank server it is console type application. It is connected to database, it has request handler to receive the request. The bank server content all information about the client while it connected to main server. It contents the client account id number, pin code, acc no; name..etc such type of information. Goals of bank server: Banking system comprise a host computer and at least one portable terminal The terminal provide arrange of banking service over an connection to the host bank computer During a banking mode of operation control reside in the host bank computer The borrowing raising or taking up of money. IV. IMPLEMENTATION AND TESTING In multithreading multiple threads are created for each program so that first processing is achieved. Our main focus is on client side. There are multiple clients sending multiple requests which are received by the main server and the main server will create the thread of request and send it to the particular database depending on the request. The main modules are: Bank Server Main Server ATM Server We have various banks having their own database which stores the information about the customer. Also, there is one bank server used for redirection purpose. There are many databases having the information of particular bank. There are various ATM clients sending the request to the main server. The associated threads are created by the server and then forwarded to the specific bank database. In the ATM interface we start by entering the bank id along with valid password through the login form. The banks are identified on the bases of this bank id. First two digits are required for identifying the particular bank and the rest is account number of customer. The identification numbers of banks are as follows: SBI-99 ICICI-88 HDFC-78 If the password is not valid it will give error and you have to enter the right password. After Login the customer can perform his transaction effectively. The customer can withdraw amount, transfer money change the pin, checking balance. Elements of Architecture: A. ATM Clients These are the ATM customers which send their ATM request for their particular ATM services. Now this ATM request includes: Log in Log out Withdrawing money Checking balance Money transfer Change of pin B. Main Server Whatever request is given by ATM clients its associated threads are created inside the main server. These threads are redirected to the respective banks. Also, the ATM client can send many request at a time out of that, only one request are forwarded and rest are blocked. These threads handovers the request to the respective bank database and it get disabled. C. Bank Server The request forwarded by main server in the form of threads is received by bank server depending on the status of the bank database, the query is fired. D. Bank Databases It includes database of SBI, ICICI and HDFC banks. It consists of the table Acc Master having the following fields: Name Account number Password Balance Enabled Credit limit 2015, IJARCSSE All Rights Reserved Page 237

5 V. CONCLUSION Prof. Miss. P. V. Dudhe Author is In this paper we have presented a system which sends Assistant Professor with Department the request to the appropriate server in to reduce response of Information Technology, time and increase the system capacity under load. A P.R.M.I.T&R, Badnera heavily loaded application can sometimes crash due to transactional overload. An application can be deployed on multiple servers. This application implements a redirection server called Visa server which analyzes request and sends Miss. R. N Sawade Author is Student to the server and maintains a load database. Depending on with Department of Information the workload on the servers the new work will be allocated Technology, P.R.M.I.T&R, Badnera and excess load is avoided for smooth performance, hence the concept of request redirection is required. ACKNOWLEDGMENT I take this opportunity of thanking my guide Prof. P. V. Dudhe, Assistant Professor Department of Information Technology Engineering, P.R.M.I.T&R, Badnera for her indispensable guidance, generous help, perpetual encouragement, constant attention offered throughout in preparation of this paper. REFERENCES [1] Valeria Cardellia, Michele Colajanni, Philip.S. Yu Dynamic Load Balancing on Web Server System, Publidhe by IEEE Internet Computing /99. [2] L. Garber. Technology news: Denial-of-service attacks rip the Internet. Computer, 33(4):12-17, Apr [3] Limin Wang, Vivek Pai and Larry Peterson, The Effectiveness of Request Redirection on CDN Robustness USENIX Association 5th Symposium on Operating Systems Design and Implementation [4] Ankush P. Deshmukh, Prof. Kumarswamy Pamu, Applying Load Balancing: A Dynamic Approach, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 6, June 2012 [5] D. Andresen, T. Yang, V. Holmedahl, and O. Ibarra. Sweb: Towards a scalable world wide web server on multicomputers, 1996 [6] P.Barford M. Carvello Genrating representive Web Workload for network and sever performance evaluation, Proc of ACM Sigmetic 98,Madsion, WI, pp ,june , IJARCSSE All Rights Reserved Page 238

An Enhanced Binning Algorithm for Distributed Web Clusters

An Enhanced Binning Algorithm for Distributed Web Clusters 1 An Enhanced Binning Algorithm for Distributed Web Clusters Hann-Jang Ho Granddon D. Yen Jack Lee Department of Information Management, WuFeng Institute of Technology SingLing Lee Feng-Wei Lien Department

More information

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information

Jim Metzler. Introduction. The Role of an ADC

Jim Metzler. Introduction. The Role of an ADC November 2009 Jim Metzler Ashton, Metzler & Associates jim@ashtonmetzler.com Introduction In any economic environment a company s senior management expects that their IT organization will continually look

More information

Prof. Darshika Lothe Assistant Professor, Imperial College of Engineering & Research, Pune, Maharashtra

Prof. Darshika Lothe Assistant Professor, Imperial College of Engineering & Research, Pune, Maharashtra Resource Management Using Dynamic Load Balancing in Distributed Systems Prof. Darshika Lothe Assistant Professor, Imperial College of Engineering & Research, Pune, Maharashtra Abstract In a distributed

More information

CHAPTER 7 CONCLUSION AND FUTURE SCOPE

CHAPTER 7 CONCLUSION AND FUTURE SCOPE 121 CHAPTER 7 CONCLUSION AND FUTURE SCOPE This research has addressed the issues of grid scheduling, load balancing and fault tolerance for large scale computational grids. To investigate the solution

More information

Chapter 6: Distributed Systems: The Web. Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al.

Chapter 6: Distributed Systems: The Web. Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al. Chapter 6: Distributed Systems: The Web Fall 2012 Sini Ruohomaa Slides joint work with Jussi Kangasharju et al. Chapter Outline Web as a distributed system Basic web architecture Content delivery networks

More information

A QoS Load Balancing Scheduling Algorithm in Cloud Environment

A QoS Load Balancing Scheduling Algorithm in Cloud Environment A QoS Load Balancing Scheduling Algorithm in Cloud Environment Sana J. Shaikh *1, Prof. S.B.Rathod #2 * Master in Computer Engineering, Computer Department, SAE, Pune University, Pune, India # Master in

More information

Index Terms Authentication, Authentication technique, Cloud computing, Computing services, Multilevel authentication.

Index Terms Authentication, Authentication technique, Cloud computing, Computing services, Multilevel authentication. Volume 5, Issue 4, April 015 ISSN: 77 18X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue on Impact

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

Introduction CHAPTER. Practice Exercises. 1.1 What are the three main purposes of an operating system? Answer: The three main puropses are:

Introduction CHAPTER. Practice Exercises. 1.1 What are the three main purposes of an operating system? Answer: The three main puropses are: 1 CHAPTER Introduction Practice Exercises 1.1 What are the three main purposes of an operating system? Answer: The three main puropses are: To provide an environment for a computer user to execute programs

More information

PRACTICE QUESTIONS FOR FINAL EXAMINATION Spring 2005

PRACTICE QUESTIONS FOR FINAL EXAMINATION Spring 2005 PRACTICE QUESTIONS FOR 15.561 FINAL EXAMINATION Spring 2005 CLARIFICATION: This is not a practice final but a collection of questions similar to those likely to be on the final. COMPUTER FUNDAMENTALS PRACTICE

More information

Radware's Application Front End solution for Microsoft Exchnage 2003 Outlook Web Access (OWA)

Radware's Application Front End solution for Microsoft Exchnage 2003 Outlook Web Access (OWA) TESTING & INTEGRATION GROUP SOLUTION GUIDE Radware's Application Front End solution for Microsoft Exchnage 2003 Outlook Web Access (OWA) INTRODUCTION... 2 SOLUTION DETAILS... 3 HOW IT WORKS... 3 SOFTWARE

More information

EVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER

EVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER WHITE PAPER EVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER Overview Enterprises lose $700 billion from downtime; losses fall into three categories: lost revenue (17%), lost productivity (73%), and

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distributed Systems Principles and Paradigms Chapter 01 (version September 5, 2007) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.20.

More information

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time

More information

Large-Scale Web Applications

Large-Scale Web Applications Large-Scale Web Applications Mendel Rosenblum Web Application Architecture Web Browser Web Server / Application server Storage System HTTP Internet CS142 Lecture Notes - Intro LAN 2 Large-Scale: Scale-Out

More information

Load balancing algorithms in cluster systems

Load balancing algorithms in cluster systems Load balancing algorithms in cluster systems Andrzej Imiełowski 1,* 1 The State Higher School of Technology and Economics in Jarosław, Poland Abstract. The beginning of XXI century brought dynamic rise

More information

Distributed Systems. Overview. Distributed Systems September A distributed system is a piece of software that ensures that:

Distributed Systems. Overview. Distributed Systems September A distributed system is a piece of software that ensures that: Distributed Systems Overview Distributed Systems September 2002 1 Distributed System: Definition A distributed system is a piece of software that ensures that: A collection of independent computers that

More information

Designing Issues For Distributed Computing System: An Empirical View

Designing Issues For Distributed Computing System: An Empirical View ISSN: 2278 0211 (Online) Designing Issues For Distributed Computing System: An Empirical View Dr. S.K Gandhi, Research Guide Department of Computer Science & Engineering, AISECT University, Bhopal (M.P),

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)

More information

Chapter 18: Database System Architectures.! Centralized Systems! Client--Server Systems! Parallel Systems! Distributed Systems!

Chapter 18: Database System Architectures.! Centralized Systems! Client--Server Systems! Parallel Systems! Distributed Systems! Chapter 18: Database System Architectures! Centralized Systems! Client--Server Systems! Parallel Systems! Distributed Systems! Network Types 18.1 Centralized Systems! Run on a single computer system and

More information

A Semi-Distributed Load Balancing Algorithm Using Clustered Approach

A Semi-Distributed Load Balancing Algorithm Using Clustered Approach Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.843

More information

IX: A Protected Dataplane Operating System for High Throughput and Low Latency

IX: A Protected Dataplane Operating System for High Throughput and Low Latency IX: A Protected Dataplane Operating System for High Throughput and Low Latency Belay, A. et al. Proc. of the 11th USENIX Symp. on OSDI, pp. 49-65, 2014. Reviewed by Chun-Yu and Xinghao Li Summary In this

More information

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing.

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. R (2) N (5) Oral (3) Total (10) Dated Sign Experiment No: 1 Problem Definition: Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. 1.1 Prerequisite:

More information

CCDP-ARCH. Section 11. Content Networking

CCDP-ARCH. Section 11. Content Networking CCDP-ARCH Section 11 As a designer, content networking technologies allows you to intelligently distribute content throughout the network, thereby reducing WAN bandwidth requirements. For example, a user

More information

Distributed Systems Principles and Paradigms. Chapter 01: Introduction. Contents. Distributed System: Definition.

Distributed Systems Principles and Paradigms. Chapter 01: Introduction. Contents. Distributed System: Definition. Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Version: February 21, 2011 1 / 26 Contents Chapter 01: 02: Architectures

More information

Paradigm Shift of Database

Paradigm Shift of Database Paradigm Shift of Database Prof. A. A. Govande, Assistant Professor, Computer Science and Applications, V. P. Institute of Management Studies and Research, Sangli Abstract Now a day s most of the organizations

More information

International Journal of Modern Trends in Engineering and Research e-issn No.: , Date: April, 2016

International Journal of Modern Trends in Engineering and Research   e-issn No.: , Date: April, 2016 International Journal of Modern Trends in Engineering and Research www.ijmter.com e-issn No.:2349-9745, Date: 28-30 April, 2016 Campus Area Network Automation Prof. Bhavana Khivsara 1, Monika S. Firodiya

More information

Deploying the BIG-IP System v10 with Oracle s BEA WebLogic

Deploying the BIG-IP System v10 with Oracle s BEA WebLogic DEPLOYMENT GUIDE Deploying the BIG-IP System v10 with Oracle s BEA WebLogic Version 1.0 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Oracle s BEA WebLogic Prerequisites and

More information

Load Balancing Technology White Paper

Load Balancing Technology White Paper Load Balancing Technology White Paper Keywords: Server, gateway, link, load balancing, SLB, LLB Abstract: This document describes the background, implementation, and operating mechanism of the load balancing

More information

Distributed Systems Principles and Paradigms. Chapter 01: Introduction

Distributed Systems Principles and Paradigms. Chapter 01: Introduction Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Introduction Version: October 25, 2009 2 / 26 Contents Chapter

More information

Design and Implementation of Search Engine Using Vector Space Model for Personalized Search

Design and Implementation of Search Engine Using Vector Space Model for Personalized Search Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

A New HadoopBased Network Management System with Policy Approach

A New HadoopBased Network Management System with Policy Approach Computer Engineering and Applications Vol. 3, No. 3, September 2014 A New HadoopBased Network Management System with Policy Approach Department of Computer Engineering and IT, Shiraz University of Technology,

More information

Keywords Data alignment, Data annotation, Web database, Search Result Record

Keywords Data alignment, Data annotation, Web database, Search Result Record Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Annotating Web

More information

GRID SIMULATION FOR DYNAMIC LOAD BALANCING

GRID SIMULATION FOR DYNAMIC LOAD BALANCING GRID SIMULATION FOR DYNAMIC LOAD BALANCING Kapil B. Morey 1, Prof. A. S. Kapse 2, Prof. Y. B. Jadhao 3 1 Research Scholar, Computer Engineering Dept., Padm. Dr. V. B. Kolte College of Engineering, Malkapur,

More information

Assignment #2. Csci4211 Spring Due on March 6th, Notes: There are five questions in this assignment. Each question has 10 points.

Assignment #2. Csci4211 Spring Due on March 6th, Notes: There are five questions in this assignment. Each question has 10 points. Assignment #2 Csci4211 Spring 2017 Due on March 6th, 2017 Notes: There are five questions in this assignment. Each question has 10 points. 1. (10 pt.) Design and describe an application-level protocol

More information

LOAD BALANCING ALGORITHMS ROUND-ROBIN (RR), LEAST- CONNECTION, AND LEAST LOADED EFFICIENCY

LOAD BALANCING ALGORITHMS ROUND-ROBIN (RR), LEAST- CONNECTION, AND LEAST LOADED EFFICIENCY LOAD BALANCING ALGORITHMS ROUND-ROBIN (RR), LEAST- CONNECTION, AND LEAST LOADED EFFICIENCY Dr. Mustafa ElGili Mustafa Computer Science Department, Community College, Shaqra University, Shaqra, Saudi Arabia,

More information

Distributed System: Definition

Distributed System: Definition 2 / 25 Introduction Distributed System: Definition Definition A distributed system is a piece of software that ensures that: a collection of independent computers appears to its users as a single coherent

More information

Chapter 20: Database System Architectures

Chapter 20: Database System Architectures Chapter 20: Database System Architectures Chapter 20: Database System Architectures Centralized and Client-Server Systems Server System Architectures Parallel Systems Distributed Systems Network Types

More information

Internet Content Distribution

Internet Content Distribution Internet Content Distribution Chapter 1: Introduction Jussi Kangasharju Chapter Outline Introduction into content distribution Basic concepts TCP DNS HTTP Outline of the rest of the course Kangasharju:

More information

CA464 Distributed Programming

CA464 Distributed Programming 1 / 25 CA464 Distributed Programming Lecturer: Martin Crane Office: L2.51 Phone: 8974 Email: martin.crane@computing.dcu.ie WWW: http://www.computing.dcu.ie/ mcrane Course Page: "/CA464NewUpdate Textbook

More information

Lecture 1: January 23

Lecture 1: January 23 CMPSCI 677 Distributed and Operating Systems Spring 2019 Lecture 1: January 23 Lecturer: Prashant Shenoy Scribe: Jonathan Westin (2019), Bin Wang (2018) 1.1 Introduction to the course The lecture started

More information

Survey on Incremental MapReduce for Data Mining

Survey on Incremental MapReduce for Data Mining Survey on Incremental MapReduce for Data Mining Trupti M. Shinde 1, Prof.S.V.Chobe 2 1 Research Scholar, Computer Engineering Dept., Dr. D. Y. Patil Institute of Engineering &Technology, 2 Associate Professor,

More information

CS 347 Parallel and Distributed Data Processing

CS 347 Parallel and Distributed Data Processing CS 347 Parallel and Distributed Data Processing Spring 2016 Notes 12: Distributed Information Retrieval CS 347 Notes 12 2 CS 347 Notes 12 3 CS 347 Notes 12 4 Web Search Engine Crawling Indexing Computing

More information

Chapter 1: Distributed Information Systems

Chapter 1: Distributed Information Systems Chapter 1: Distributed Information Systems Contents - Chapter 1 Design of an information system Layers and tiers Bottom up design Top down design Architecture of an information system One tier Two tier

More information

CS 347 Parallel and Distributed Data Processing

CS 347 Parallel and Distributed Data Processing CS 347 Parallel and Distributed Data Processing Spring 2016 Notes 12: Distributed Information Retrieval CS 347 Notes 12 2 CS 347 Notes 12 3 CS 347 Notes 12 4 CS 347 Notes 12 5 Web Search Engine Crawling

More information

From Internet Data Centers to Data Centers in the Cloud

From Internet Data Centers to Data Centers in the Cloud From Internet Data Centers to Data Centers in the Cloud This case study is a short extract from a keynote address given to the Doctoral Symposium at Middleware 2009 by Lucy Cherkasova of HP Research Labs

More information

Take Back Lost Revenue by Activating Virtuozzo Storage Today

Take Back Lost Revenue by Activating Virtuozzo Storage Today Take Back Lost Revenue by Activating Virtuozzo Storage Today JUNE, 2017 2017 Virtuozzo. All rights reserved. 1 Introduction New software-defined storage (SDS) solutions are enabling hosting companies to

More information

Model-Based Systems Engineering: Documentation and Analysis

Model-Based Systems Engineering: Documentation and Analysis Week 1: What Is MBSE? Project Name Jane Doe 1 Instructions Before you begin, you should save your Project Portfolio on your local drive. We recommend the following format: Lastname_Firstname_Course3_Week1

More information

Network Connectivity and Mobility

Network Connectivity and Mobility Network Connectivity and Mobility BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1. Network

More information

Fundamental Research of Distributed Database

Fundamental Research of Distributed Database International Journal of Computer Science and Management Studies, Vol. 11, Issue 02, Aug 2011 138 Fundamental Research of Distributed Database Swati Gupta 1, Kuntal Saroha 2, Bhawna 3 1 Lecturer, RIMT,

More information

Modelling and Analysis of Push Caching

Modelling and Analysis of Push Caching Modelling and Analysis of Push Caching R. G. DE SILVA School of Information Systems, Technology & Management University of New South Wales Sydney 2052 AUSTRALIA Abstract: - In e-commerce applications,

More information

Table of Contents. Cisco How NAT Works

Table of Contents. Cisco How NAT Works Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Pa Available online at: Analysis of Network Processor Elements Topologies Devesh Chaurasiya

More information

Factsheet of Public Services Infrastructure (PSi) Updated on: 1st Sep 03

Factsheet of Public Services Infrastructure (PSi) Updated on: 1st Sep 03 Factsheet of Public Services Infrastructure (PSi) Updated on: 1st Sep 03 1 Objective of Paper 1.1 This document provides an overview of the Public Services Infrastructure (PSi). 2 Overview of PSi 2.1 PSi

More information

Datacenter replication solution with quasardb

Datacenter replication solution with quasardb Datacenter replication solution with quasardb Technical positioning paper April 2017 Release v1.3 www.quasardb.net Contact: sales@quasardb.net Quasardb A datacenter survival guide quasardb INTRODUCTION

More information

A Step By Step Guide To Use PayPal

A Step By Step Guide To Use PayPal A Step By Step Guide To Use PayPal Table of Contents Introduction... 3 Creating an Account... 4 PayPal Verification... 5 Verification Process... 5 Utility of Each Account... 7 Transfer of Funds... 8 Checking

More information

PeerApp Case Study. November University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs

PeerApp Case Study. November University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs PeerApp Case Study University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs November 2010 Copyright 2010-2011 PeerApp Ltd. All rights reserved 1 Executive Summary

More information

CS533 Concepts of Operating Systems. Jonathan Walpole

CS533 Concepts of Operating Systems. Jonathan Walpole CS533 Concepts of Operating Systems Jonathan Walpole SEDA: An Architecture for Well- Conditioned Scalable Internet Services Overview What does well-conditioned mean? Internet service architectures - thread

More information

Lecture 1: January 22

Lecture 1: January 22 CMPSCI 677 Distributed and Operating Systems Spring 2018 Lecture 1: January 22 Lecturer: Prashant Shenoy Scribe: Bin Wang 1.1 Introduction to the course The lecture started by outlining the administrative

More information

Client Server & Distributed System. A Basic Introduction

Client Server & Distributed System. A Basic Introduction Client Server & Distributed System A Basic Introduction 1 Client Server Architecture A network architecture in which each computer or process on the network is either a client or a server. Source: http://webopedia.lycos.com

More information

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 1 2 1 Selecting the Best Alternative Major Activities in the Analysis Phase Gather information Define system requirements Prototype for feasibility

More information

PACKET HANDLING SCHEDULING IN MULTIPLE ROUTING CONFIGURATIONS FOR FAST IP NETWORK RECOVERY

PACKET HANDLING SCHEDULING IN MULTIPLE ROUTING CONFIGURATIONS FOR FAST IP NETWORK RECOVERY Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013,

More information

Amazon ElastiCache 8/1/17. Why Amazon ElastiCache is important? Introduction:

Amazon ElastiCache 8/1/17. Why Amazon ElastiCache is important? Introduction: Amazon ElastiCache Introduction: How to improve application performance using caching. What are the ElastiCache engines, and the difference between them. How to scale your cluster vertically. How to scale

More information

VERITAS Volume Replicator. Successful Replication and Disaster Recovery

VERITAS Volume Replicator. Successful Replication and Disaster Recovery VERITAS Volume Replicator Successful Replication and Disaster Recovery V E R I T A S W H I T E P A P E R Table of Contents Introduction.................................................................................1

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Selection of a Scheduler (Dispatcher) within a Datacenter using Enhanced Equally Spread Current Execution (EESCE)

Selection of a Scheduler (Dispatcher) within a Datacenter using Enhanced Equally Spread Current Execution (EESCE) International Journal of Engineering Science Invention (IJESI) ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 8 Issue 01 Series. III Jan 2019 PP 35-39 Selection of a Scheduler (Dispatcher) within

More information

Introduction CHAPTER. Exercises

Introduction CHAPTER. Exercises 1 CHAPTER Introduction Chapter 1 introduces the general topic of operating systems and a handful of important concepts (multiprogramming, time sharing, distributed system, and so on). The purpose is to

More information

A Methodology in Mobile Networks for Global Roaming

A Methodology in Mobile Networks for Global Roaming ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:

More information

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),

More information

Technical papers Web caches

Technical papers Web caches Technical papers Web caches Web caches What is a web cache? In their simplest form, web caches store temporary copies of web objects. They are designed primarily to improve the accessibility and availability

More information

TriScale Clustering Tech Note

TriScale Clustering Tech Note TriScale Clustering Tech Note www.citrix.com Table of Contents Expanding Capacity with TriScale Clustering... 2 How Clustering Works... 2 Cluster Communication... 3 Cluster Configuration and Synchronization...

More information

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH BEA WEBLOGIC SERVER

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH BEA WEBLOGIC SERVER DEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH BEA WEBLOGIC SERVER Deploying the BIG-IP LTM system for BEA WebLogic Server F5 Networks and BEA systems have created a highly effective way to direct traffic

More information

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN Issue 1.1 Date 2014-03-14 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or

More information

Enterprise print management in VMware Horizon

Enterprise print management in VMware Horizon Enterprise print management in VMware Horizon Introduction: Embracing and Extending VMware Horizon Tricerat Simplify Printing enhances the capabilities of VMware Horizon environments by enabling reliable

More information

1. Introduction. 2. Salient features of the design. * The manuscript is still under progress 1

1. Introduction. 2. Salient features of the design. * The manuscript is still under progress 1 A Scalable, Distributed Web-Crawler* Ankit Jain, Abhishek Singh, Ling Liu Technical Report GIT-CC-03-08 College of Computing Atlanta,Georgia {ankit,abhi,lingliu}@cc.gatech.edu In this paper we present

More information

Communication Networks

Communication Networks Communication Networks Prof. Laurent Vanbever Solution: Exercises week 15 E-mail and recap E-mail Answer the following questions about e-mail with True or False and justify your choice. a) SMTP and IMAP

More information

Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System

Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System Donald S. Miller Department of Computer Science and Engineering Arizona State University Tempe, AZ, USA Alan C.

More information

Today s class. CSE 123b Communications Software. Telnet. Network File System (NFS) Quick descriptions of some other sample applications

Today s class. CSE 123b Communications Software. Telnet. Network File System (NFS) Quick descriptions of some other sample applications CSE 123b Communications Software Spring 2004 Today s class Quick examples of other application protocols Mail, telnet, NFS Content Distribution Networks (CDN) Lecture 12: Content Distribution Networks

More information

ISP and IXP Design. Point of Presence Topologies. ISP Network Design. PoP Topologies. Modular PoP Design. PoP Design INET 2000 NTW

ISP and IXP Design. Point of Presence Topologies. ISP Network Design. PoP Topologies. Modular PoP Design. PoP Design INET 2000 NTW ISP Network Design PoP Topologies and Design ISP and IXP Design Backbone Design Addressing INET 2000 NTW Routing Protocols Security Out of Band Management IXP/IXP Workshops 1999, Cisco Systems, Inc. 1

More information

The Google File System

The Google File System The Google File System Sanjay Ghemawat, Howard Gobioff and Shun Tak Leung Google* Shivesh Kumar Sharma fl4164@wayne.edu Fall 2015 004395771 Overview Google file system is a scalable distributed file system

More information

Logical File Organisation A file is logically organised as follows:

Logical File Organisation A file is logically organised as follows: File Handling The logical and physical organisation of files. Serial and sequential file handling methods. Direct and index sequential files. Creating, reading, writing and deleting records from a variety

More information

WHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures

WHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures ASHNIK PTE LTD. White Paper WHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures Date: 10/12/2014 Company Name: Ashnik Pte Ltd. Singapore By: Sandeep Khuperkar, Director

More information

Highly Available Forms and Reports Applications with Oracle Fail Safe 3.0

Highly Available Forms and Reports Applications with Oracle Fail Safe 3.0 Highly Available Forms and Reports Applications with Oracle Fail Safe 3.0 High Availability for Windows NT An Oracle Technical White Paper Robert Cheng Oracle New England Development Center System Products

More information

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 1 Introduction Modified by: Dr. Ramzi Saifan Definition of a Distributed System (1) A distributed

More information

ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks

ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks 2 WHAT IS A DDOS-ATTACK AND WHY ARE THEY DANGEROUS? Today's global network is a dynamically developing

More information

Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs

Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs Girish K 1 and Mrs. Shruthi G 2 1 Department of CSE, PG Student Karnataka, India 2 Department of CSE,

More information

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web

Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web TR020701 April 2002 Erbil Yilmaz Department of Computer Science The Florida State University Tallahassee, FL 32306

More information

Chapter 3. The Basics of Networking

Chapter 3. The Basics of Networking Chapter 3 The Basics of Networking Learning Objectives Tell whether a communication technology (Internet, radio, LAN, etc.) is synchronous or asynchronous; broadcast or point-to-point Explain the roles

More information

Business Continuity and Disaster Recovery. Ed Crowley Ch 12

Business Continuity and Disaster Recovery. Ed Crowley Ch 12 Business Continuity and Disaster Recovery Ed Crowley Ch 12 Topics Disaster Recovery Business Impact Analysis MTBF and MTTR RTO and RPO Redundancy Failover Backup Sites Load Balancing Mirror Sites Disaster

More information

CSCI 4717 Computer Architecture

CSCI 4717 Computer Architecture CSCI 4717/5717 Computer Architecture Topic: Symmetric Multiprocessors & Clusters Reading: Stallings, Sections 18.1 through 18.4 Classifications of Parallel Processing M. Flynn classified types of parallel

More information

COMPUTER SKILLS COMP101

COMPUTER SKILLS COMP101 COMPUTER SKILLS COMP101 Chapter 4 Introduction to Computer Networks Definitions and Terminologies Computer Network A network consists of two or more computers that are linked in order to share resources

More information

Client-server Basics. 1. Motivation

Client-server Basics. 1. Motivation Page 1 of 8 Client-server Basics Oxford Brookes University 2004 Contents 1. Motivation 2. Basic Model of the Web 3. Extensions - Caching and Proxies 4. High Performance Web Servers 5. Web Services Appendices

More information

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration

More information

Lecture 05 Application Layer - I

Lecture 05 Application Layer - I Computer Networks and Internet Protocol Prof. Soumya Kanti Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 05 Application Layer - I Hi. So, we will

More information

Lecture 23 Database System Architectures

Lecture 23 Database System Architectures CMSC 461, Database Management Systems Spring 2018 Lecture 23 Database System Architectures These slides are based on Database System Concepts 6 th edition book (whereas some quotes and figures are used

More information

Replication in Distributed Systems

Replication in Distributed Systems Replication in Distributed Systems Replication Basics Multiple copies of data kept in different nodes A set of replicas holding copies of a data Nodes can be physically very close or distributed all over

More information

Intrusion Detection Using Data Mining Technique (Classification)

Intrusion Detection Using Data Mining Technique (Classification) Intrusion Detection Using Data Mining Technique (Classification) Dr.D.Aruna Kumari Phd 1 N.Tejeswani 2 G.Sravani 3 R.Phani Krishna 4 1 Associative professor, K L University,Guntur(dt), 2 B.Tech(1V/1V),ECM,

More information

Running the Setup Web UI

Running the Setup Web UI The Cisco Prime IP Express setup interview in the web UI takes you through a series of consecutive pages to set up a basic configuration. For an introduction and details on the basic navigation for the

More information

CSE544 Database Architecture

CSE544 Database Architecture CSE544 Database Architecture Tuesday, February 1 st, 2011 Slides courtesy of Magda Balazinska 1 Where We Are What we have already seen Overview of the relational model Motivation and where model came from

More information